Majority of IT managers say they work on mobile security without EMM or MMS help

More than half of respondents in a survey conducted by mobility and telecom expense management (TEM) provider Tangoe say their job to manage mobile devices ploughs a lonely furrow.

In other words, of the 100 IT managers polled, across a variety of enterprises, very few are using enterprise mobility management (EMM) or managed mobility (MMS) offerings – although many plan to over the next two years.

Given this publication has

By James Bourne, 16 March 2017, 0 comments. Categories: Enterprise Mobility, Research, Security.

A note to CEOs: Shadow IT is not someone else’s problem

Trends like bring your own device (BYOD) and bring your own app (BYOA) – or shadow IT as some industry observers call it - are fast spreading throughout the workplace.

On the whole, they are welcomed by the enterprise for the additional flexibility and productivity benefits they bring.  After all, letting employees use their own phones and apps for work tasks saves time and investment on new IT, right?

But there’s a catch.

Alongside the benefits, shadow IT is also allowing fresh...

By Omri Sigelman, 16 March 2017, 0 comments. Categories: Applications, BYOD, CIO, Employees, Enterprise Mobility, Security.

Why your new enterprise app will fail: Avoid these classic pitfalls

(c)iStock.com/erhui1979

Last year, we wrote a blog post about what employees want in enterprise mobile apps. The key criteria were (and still are) simple: employees want apps that work, that make their lives easier, and that are easy to use.

Follow those guidelines, and it’s more likely than not that your app will succeed given the right infrastructure and strategy. But what about the opposite end of the spectrum: what are some signs your shiny new app might fail?

Nitesh...

By App47, 20 February 2017, 0 comments. Categories: Applications, Enterprise Mobility, Security.

Many local authorities lagging behind on BYOD, research warns

(c)iStock.com/pixsooz

Almost half of local authorities in England do not have a bring your own device (BYOD) policy in place, according to new research from Annodata.

The managed service provider submitted a freedom of information request to 79 council districts from all regions in England, and found 42% do not have BYOD implementation.

“The public sector in particular needs to approach BYOD with due diligence and special emphasis needs to be placed on security when employees are using their own devices...

By James Bourne, 16 February 2017, 1 comment. Categories: BYOD, Employees, Enterprise Mobility, Security.

How the CIO role has been ‘completely transformed’ in recent years through IT shift

(c)iStock.com/Akindo

One in three CIOs say their job role has been ‘completely transformed’ in recent years while another third say their job has become more important in their company’s hierarchy, according to a new piece of research from Bitdefender.

The study, titled ‘Virtualisation makes CIOs’ roles key’, surveyed more than 150 UK-based IT decision makers in companies with more than 1,000 PCs, and found some worrying security findings. Only 55% of incoming cyberattacks...

By James Bourne, 15 February 2017, 0 comments. Categories: CIO, Enterprise Mobility, Security.

How CSOs can avoid the shadow of a cybersecurity Groundhog Day

(c)iStock.com/LordRunar

Every year, in Pennsylvania, people gather in droves to watch a groundhog predict how much longer winter will last. For Americans, it’s a pretty big deal to see this glorified gerbil pop up and look terrified as throngs of onlookers wait in hushed silence to see whether the mighty Phil from Punxsutawney will see his shadow. 

Historically, the varmint is only 39% accurate, but in truth that’s probably better than most human non-groundhog meteorologists.

Like groundhogs,...

By Duncan Hughes, 14 February 2017, 0 comments. Categories: CIO, Security.

WebEx most popular enterprise app says MobileIron – yet organisational bad practices remain

(c)iStock.com/allvisionn

WebEx is the most popular enterprise app installed by MobileIron customers, with Dropbox, Facebook and WhatsApp among the most frequently blacklisted, according to a new report.

The study, the enterprise mobility management (EMM) provider’s third Mobile Security and Risk Review report, also found that almost 80% of firms are using more than 10 apps for business, with almost one in five (18%) using Apple’s Volume Purchase Program (VPP) – a number which goes up in...

By James Bourne, 13 February 2017, 0 comments. Categories: Applications, Data Loss, Enterprise Mobility, Security.

Skycure integrates with Microsoft EMS in enhanced mobile security play

(c)iStock.com/JasonDoiy

Mobile threat defence provider Skycure has announced it is collaborating with Microsoft on integrating its platform with Microsoft Enterprise Mobility + Security (EMS).

The collaboration ‘allows organisations to more confidently address the needs of today’s mobile workforce, ensuring that devices are risk-free and secure before accessing corporate resources’, according to the press materials.

Customers should expect ‘seamless integration’ with EMS,

By James Bourne, 09 February 2017, 1 comment. Categories: Enterprise Mobility, Microsoft, Security.

CISO research advocates ’30 day sprint’ to get privileged credentials up to date

(c)iStock.com/erhui1979

If you had a panel of Global 1000 chief information security officers (CISO) at your disposal, what would you ask them? A new report issued by CyberArk argues organisations can improve their security fitness and protect privileged credentials in a ’30 day sprint’.

The report outlines a ‘proven framework’ to implement a set of key controls around privileged credentials, noting that organisations can make gains ‘with a sufficient sense of urgency’. In...

By James Bourne, 08 February 2017, 0 comments. Categories: Data Loss, Employees, Security.

It’s time to re-energise IT – and make the IT department more than a M*A*S*H unit

(c)iStock.com/BrianAJackson

There’s no holding back the obvious truths in the land of IT. Helpdesks are inundated and overwhelmed; we are overworked and our teams are scrambling for some lucidity. The problem is simple, and most of us know: mundane, repeated and wearisome tasks that can, or probably should, be automated.

Much stress and time could be saved for our IT team’s employees by taking away some of these entanglements, but many organisations overlook doing so in the name of convenience...

By Dean Wiech, 07 February 2017, 0 comments. Categories: Employees, Identity, Security.